VAR-201308-0090
Vulnerability from variot - Updated: 2025-04-11 23:05The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626. Vendors have confirmed this vulnerability Bug ID CSCuh26626 It is released as.Skillfully crafted by a third party POST Arbitrary code may be executed via a request. Cisco Wide Area Application Services is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue is being tracked by Cisco bug ID CSCuh26626. This software is mainly used in the link environment with small bandwidth and large delay. Cisco WAAS Software 4.x, Cisco WAAS Software 5.x prior to 5.0.3e, Cisco WAAS Software 5.1.x prior to 5.1.1c, Cisco WAAS Software 5.2.x prior to 5.2.1 are affected
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201308-0090",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.1.1"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.0.23"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.0.25"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.0.19"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.1.3"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.0.27"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.4.7"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.21"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.1"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0.3"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.11"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.17"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.1.5"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3.1"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.4.3"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.13"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0.1"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.5"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2.1"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.3"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3.3"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3.5"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.4.5"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.4.1"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.1.1"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.2"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.7"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.0.9"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2.3"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.1.7"
},
{
"model": "wide area application services software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.0.3e"
},
{
"model": "wide area application services software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.1.1c"
},
{
"model": "wide area application services software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "5.2.x"
},
{
"model": "wide area application services software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.2.1"
},
{
"model": "wide area application services software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "5.1.x"
},
{
"model": "wide area application services software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "5.x"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-685"
},
{
"db": "NVD",
"id": "CVE-2013-3443"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:cisco:wide_area_application_services",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "61542"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-685"
}
],
"trust": 0.9
},
"cve": "CVE-2013-3443",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2013-3443",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-63445",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2013-3443",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2013-3443",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201307-685",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-63445",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63445"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-685"
},
{
"db": "NVD",
"id": "CVE-2013-3443"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626. Vendors have confirmed this vulnerability Bug ID CSCuh26626 It is released as.Skillfully crafted by a third party POST Arbitrary code may be executed via a request. Cisco Wide Area Application Services is prone to a remote code-execution vulnerability. \nAttackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \nThis issue is being tracked by Cisco bug ID CSCuh26626. This software is mainly used in the link environment with small bandwidth and large delay. Cisco WAAS Software 4.x, Cisco WAAS Software 5.x prior to 5.0.3e, Cisco WAAS Software 5.1.x prior to 5.1.1c, Cisco WAAS Software 5.2.x prior to 5.2.1 are affected",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-3443"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"db": "BID",
"id": "61542"
},
{
"db": "VULHUB",
"id": "VHN-63445"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-3443",
"trust": 2.8
},
{
"db": "BID",
"id": "61542",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "54367",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "54372",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1028851",
"trust": 1.1
},
{
"db": "OSVDB",
"id": "95877",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003630",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201307-685",
"trust": 0.7
},
{
"db": "CISCO",
"id": "20130731 CISCO WAAS CENTRAL MANAGER REMOTE CODE EXECUTION VULNERABILITY",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-63445",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63445"
},
{
"db": "BID",
"id": "61542"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-685"
},
{
"db": "NVD",
"id": "CVE-2013-3443"
}
]
},
"id": "VAR-201308-0090",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-63445"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-11T23:05:36.259000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20130731-waascm",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-waascm"
},
{
"title": "30211",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30211"
},
{
"title": "cisco-sa-20130731-waascm",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/JP/111/1119/1119242_cisco-sa-20130731-waascm-j.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63445"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"db": "NVD",
"id": "CVE-2013-3443"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/61542"
},
{
"trust": 1.7,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130731-waascm"
},
{
"trust": 1.1,
"url": "http://osvdb.org/95877"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1028851"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/54367"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/54372"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86121"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3443"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3443"
},
{
"trust": 0.3,
"url": "www.cisco.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63445"
},
{
"db": "BID",
"id": "61542"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-685"
},
{
"db": "NVD",
"id": "CVE-2013-3443"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-63445"
},
{
"db": "BID",
"id": "61542"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-685"
},
{
"db": "NVD",
"id": "CVE-2013-3443"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-01T00:00:00",
"db": "VULHUB",
"id": "VHN-63445"
},
{
"date": "2013-07-31T00:00:00",
"db": "BID",
"id": "61542"
},
{
"date": "2013-08-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"date": "2013-07-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201307-685"
},
{
"date": "2013-08-01T13:32:30.387000",
"db": "NVD",
"id": "CVE-2013-3443"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-63445"
},
{
"date": "2013-08-01T20:35:00",
"db": "BID",
"id": "61542"
},
{
"date": "2013-08-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003630"
},
{
"date": "2013-08-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201307-685"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2013-3443"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201307-685"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco WAAS Software of Web Vulnerability to execute arbitrary code in service framework",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003630"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201307-685"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.